Together we can secure and accelerate any network .

Core Beliefs & Values

You need a secure network.

We believe networks should be inherently secure.

Jentu turns the golden image (which contains your Operating System) into an application-driven streaming protocol. This is achieved by intelligent caching and carefully crafted bits which control a representation of the disk block to the endpoint in a Jentu network.

This means very little data traverses the wire and ensures network usage is low and intrusion detection is easier then ever before.

You deserve a fast network.

We believe your network should be fast.

Jentu’s adaptive storage has been rigorously tested and found to accelerate network speeds up to 20x even with the most simple switch – and over WiFi!

When Jentu is streaming your Operating System, DATA coming from your local storage or remote cloud is delivered simultaneously, resulting in response times for network endpoints that are unparalleled.

Your DATA belongs to you.

We believe all your data should belong to you!

It’s likely the reason you moved to the cloud is because the existing network tools were expensive, ineffective, hard to manage and required a team to maintain. If you had a software that solved these problems, saved you money and improved your overall experience, would you even consider the cloud? Trusting your DATA with a third-party has led to billions of $ in irreparable data breaches. Should your DATA be in someone elses hands? Should your DATA not belong to you?

Jentu creates a “local cloud” – one that is more stable and secure than a remote DATA centre. It solves all the problems of current internal network models, at a fraction of the cost.

We stabilize your network, providing an end-user experience that allows you to control your DATA in a reliable network environment.

Our Philosophy…

We believe that traversing packets should be made “simple but not simpler“, since most breaches target the endpoint or IoT device in search for a persistent vulnerability. In a Jentu world, there is little to exploit on end user devices since there is no endpoint storage. There’s no hard drive to hack.

“The best IO is the one you don’t have to do.” – Gene Amdahl

Jentu has adaptive storage, used in a uniquely clever way unlike anything offered by the virtualization platforms of the modern data centre. Our disaggregated approach is inherently secure and reaches very low latency with an elastic algorithm and replication.

Breach Mitigation

All networks are interconnected, whether local or in the cloud. An infected machine, linked to other endpoints, causes all endpoints to be at risk of infection.

We know infections and breaches are inevitable. The question is, how to limit infection and breaches? How fast can you deal with them? Can you mitigate the damage before it spreads?

The pitfalls of user desktops today – whether virtual or physical (and even when users are well-educated), are evident. Zero days have exposed unseen amounts of malicious viral infection to hundreds of millions of desktops worldwide via an infinite array of phishing methodologies.

In current network models, there is a huge opportunity for breach and infection because of the significant volume of attack vectors – your hard drives. In most cases, mitigating a breach or infection can take weeks to months. The cost to you is more than money – time, your corporate reputation, your job and possibly your corporation are at stake too. CEOs are fired regularly for failing to properly protect the company from a breach.

In the Jentu model, attack vectors are reduced because there are no vulnerable endpoints. We don’t require persistent storage or caching (hard drives) at the endpoint. In our design, the attack vectors are reduced and easily managed because malware cannot access the golden image on your server.

With Jentu, mitigation of a breach takes seconds. A simple reboot of the system resolves 99% of your network issues.

Turn off. Turn on. Problem gone.

Which network model would you prefer?

What is Jentu Software?

In the Jentu model, your network of endpoints uses a single server-maintained image that is run locally on each desktop. This makes Jentu networks lightning fast, secure, inexpensive, stable & simple to manage.

In the Jentu model, your desktops require no hard drive – we call it “diskless computing”. Reducing the number of hard drives in your network drastically reduces your attack vectors. This creates a faster, more secure network that is significantly easier to manage.

Because Jentu offers security, stability, speed and simplicity at a fraction of the cost of other network solutions available today, we believe this is the most disruptive network technology on the market.